Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and systems for managing virtual identities in the internet

a virtual identity and internet technology, applied in the field of methods and systems for managing virtual identities in the internet, can solve the problems of system insufficient data to generate indications, harming people's reputation, etc., and achieve the effect of negative icredi

Inactive Publication Date: 2011-02-03
UNITED PARENTS ONLINE
View PDF19 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0006]Embodiments of the present invention allows for accumulating identities of seemingly anonymous Internet users, and ensuring that while two anonymous people are interacting on-line:
[0019](1) Generating a finger print for each virtual identity—this allows for overcoming anonymity challenges; the finger prints can use one or more sources of information:
[0045]At the same time, the credibility of the content is vital for the degree of the exposure and the weight that the content will receive. By using the current invention, the person as well as the site owner can ensure that the person is a credible person, without ever having to provide identifying information not desired by the person—to the site or to the public.USAGE EXAMPLE II Child Protection

Problems solved by technology

For example:Unknown anonymous—an unknown person with no ICredit history or real-world identification data; might be a dangerous identity—but the system does not have sufficient data to generate an indication.Reliable anonymous—an anonymous person—who has gained sufficient ICredit history, but has not provided any real-world authentication; this might be sufficient identification for chat rooms and for content in Web 2.0 sites.Reliable credible anonymous—an anonymous (for the sake of the interaction) person—who has gained sufficient ICredit history and has also identified himself to the system with real-world identification; this might be useful for transactional committing forums.Professionally authenticated anonymous—a person who's either ICredit history or identification guarantee the specific profession in question; this might be useful for professional forums.Identified credible—a person who is identified to the interaction partner, but needs certification from the system—that this is really the person.
The space owner is legally exposed as malicious users can publish harmful content that harm the reputation of people, or which is illegal in some other way.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for managing virtual identities in the internet
  • Methods and systems for managing virtual identities in the internet
  • Methods and systems for managing virtual identities in the internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060]The present invention relates to methods and systems for managing identities, including anonymous identities within the Internet. The principles and operation for such methods and systems, according to the present invention, may be better understood with reference to the accompanying description and the drawings.

[0061]Referring now to the drawings, FIG. 1 shows the current situation: three chat partners, J13, K15 and R16 access a chat service. Once J13 and K15 are authenticated with the chat service provider by the communication indicated by numbers 1 and 2, J13 and K15 establish a direct chat session marked by the number 3.

[0062]In another possible scenario—R16 may either not be socially related to the other two participants, or they have not authorized him to view their status. In yet another scenario—the chat occurs in a ‘public room’ in which case all the communication can be hosted by the chat provider.

[0063]Using the current invention, as depicted in FIG. 2, all the chat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses methods and systems for managing and maintaining identities over time within the practically anonymous Internet environment. Said system and methods provide protection by tracking identities of partners over time, within multiple relations and over-riding common practices for identity switching.

Description

FIELD AND BACKGROUND OF THE INVENTION[0001]The present invention relates to methods and systems for uniquely identifying, validating and evaluating identities of Internet users and the nature of their activities and the relations they are involved in.SUMMARY[0002]It is the purpose of the present invention to provide methods and systems for identifying the people as they appear in the Internet and their characteristics over time, and in particular the nature of the relations these people are involved in, and the activities they take part in. Such a service could provide ‘quality assurance’ even to anonymous identities. Three possible usages of such a method are:[0003]a. To protect children from on-line predators.[0004]b. To provide quality stamp for content that is provided by identified as well as anonymous Web 2.0 users.[0005]c. To protect against virtual identity thefts.The core capability of the invention is the ability to track people and relations over time, rather than just to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/16G06F15/173G06N7/04
CPCG06Q10/10H04L63/102H04L63/14H04L67/306H04L12/1827H04L63/20
Inventor LAVY, HANANZERNIK, DROR
Owner UNITED PARENTS ONLINE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products